Contents Section 1: SELF MANAGEMENT 2 1.1: Introduction 2 1.2: Market Research 2 1.3: Literature Review 2 1.4: Artefact Plan 3 1.5: Design Documentation 3 1.6: Testing 3 1.7: Conclusion and Further work 3 Section 2: COMMUNICATION AND QUALITY OF REPORT 4 2.1: Current Progress 4 2.2: Progress Compared to product plan 4 2.2: Milestone Progress 7 2.3: Problems 7 Section 3: REFLECTION 7 3.1: Introduction 7 3.2: Personal Report 8 3.3: Reflection on action 8 3.4: Reflection on Teaching 9 3.5: Connections 9 3.6: Identifying any gaps 9 Section 4: CONCLUSION 9 4.1: Time Management 9 4.2: Organization 10 4.3: Reading and Note Taking 10 4.4: Problems and issues 10 4.5: How problems and issues were solved 10   Section 1: SELF MANAGEMENT 1.1: Introduction Cloud computing is the new and the latest technology which is available for storage and file sharing. The basic and the underline concept of cloud computing is that it separate the application from the operating system from the hardware which runs everything. This means with the help of cloud computing there is no use of expensive hardware such as servers, cpu, hard drive etc to be required to use cloud computing. The main idea of using cloud computing is that it disconnects the application, the operating system and the hardware from themselves. It works like a virtual computer as it creates its own operating system and works on that. With the help of virtualization if a users using a system working in the cloud and if the system fails, or if there is a power fails the work is not lost. The user can simply log into another system and resume its work. Virtualisation is a part of cloud computing. The simplest form of cloud computing is its web application which is used by the user and it’s created by using standard world wide web technology which is crated by using html, java, xms etc. Cloud computing consists of highly virtualised data centres that provides various hardware, software and information resources to us when needed. Any organisation simply connect to the cloud and can use it pay per use basis which is one of the feature of having cloud computing which can help companies to avoid capital expenditure on additional on premises infrastructure resources and instantly scale up or down according the business requirement. 1.2: Market Research A very well widespread research will be conducted to get the best results out. A bunch of referenced text and source will be made which includes acknowledged texts from different sources, standards documents, white papers, analysts’ reports and conference journals industry periodicals. Privacy policy, acceptable use policy, terms of use and service level agreements is different kind of data for this research which will be collected from statements about available websites of the cloud vendors. If any information seems to be missing a research of whitepapers, press releases and news articles of cloud computing in different IT magazines will be done. From the list of top 10 Forrester research a cloud computing vendors will be chosen to continue with the project. 1.3: Literature Review The term cloud meand to delever hoster service over the internet.Cloud computing is the new way and trend to store information, sharing resources and is used by many types of users.Like there is many advantages of usinf cloud computing it also has security issues in which can lead to data beign lost or tampered with during the transmission. By enabling and add extra security feature for the protection of data in regeneration coding based which will cover a major security issue in cloud computing and from a business viewpoint that will protects its cutomers and sensitive data. . In order to achieve I will be designing and implementing Data integrity protection (DIP) for a precise code regeneration and keeping in mind to preserve it’s its basic fault tolerance and to repair traffic. This will enable the clients or users which are using the service to easily see confirm the data integrity of different types of different subsets of data which is been outsourced against malicious corruptions. 1.4: Artefact Plan My client wants to expand his horizon over the World Wide Web by introducing his entire product online for users to download and pay for the service. The company wants to move services to cloud as much as possible as its more cheap, flexible, easy to recover and want to get all the feature of a cloud network which can boost up the company.In order to achieve this my first stage of planning will be to get the requirement and the solution for the project. To setup a website on the cloud, the organization can be available in a website hosting service provider. A domain name can be purchased for the website, with the required name. To add data storage in the network Google apps will be installed in the network. After the network is successfully installed implementing of the security is the next step and then following test will be carried out to see if it successfully configured. 1.5: Design Documentation The design part of the project is a lengthy process as the design for each stage will reflect on the completion of the project. The first design will be in packet tracer which will be used to design the layout of the network and configuration will be carried out to see if the network is successfully build before applying in the real network. The data flow diagram is one of the most improvement tools used by the system analyst. A data flow diagram should be the first tool used by system analyst to model system components. These components are the system processes; the data used by this processes and external entities that interact with the system and the information flows in the system. A database design will be also included in order to complete the security part of the prioject. 1.6: Testing Testing is the most crucial and importyant part which is conducted at the end of the project.Testing the system is important as it helps to verify the system which is been built is correct and also helps to find out any faults if there is nay while conductinf the test. Testing should be carried out at each developments stage as faults can be recognised and rectified. Once all the results of the test is gathered and studied it provides the quality of the system which is been built and sets the standards up. The details of the software functionality tests are given below. • Integration Testing • Unit Testing • Validation Testing • Output Testing • Performance Testing 1.7: Conclusion and Further work The project still has a long way to go. The implementation of the design and the network needs to meet the client standards and its requirment. A lot of work is still left in order to finish this prokject. The design for the network and software implementatuion is the most difficut and the crucila part of the project. After completing the design part the codes needs to implemented in order for the design to work. The final report is also left after the completion of the technical part. Section 2: COMMUNICATION AND QUALITY OF REPORT 2.1: Current Progress The main aim of this project is to to build a network with cloud computing as it will help the company to improve its sales and make it easy for the employee to work with each other.Another aim of our proposed system is to protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage, along with efficient data integrity Reports and article paeres have been reviewed for my client compmay majestic software development in oreder to provide them with background information on cloud computing, its uses and the important features on how it will help the compnay to boost up its sales. Documentation was created in which it contains a detail report of what kind of network will be built for the compnay and the extra security which will ne added in the network which will help the compnay to save its sensitive data. System implementaion has been carried out which imvolves a process of converting a new or revised system design into operational one.Some implementtaion which were made was : • Implementation of the current computer system present in the company with a new one, the challenges encountered are converting files, training users, and verifying printouts for integrity. if this is not done properly there could be many problems which can arise in the future. • Implementing an application which is been modified in the system and replacing the existing one using the same computer. It is easy to handle as there are no major changes in the files. The network design in the packet tracer is been designed and the following configuration is implemented in packet tracer to see the end results of the network. All the software and the resources which is needed in order to complete the project is available to use. 2.2: Progress Compared to product plan My project plan is to Design a cloud network and give the best proposal to my client who is a software development organization. In order to achieve each aspects and meet all requirement for my client my project plan will provide a meaning and definition of the whole project which will also include the objectives and the goals. The project plan will also acts as an agreement between the clients, the project manager, people who are sponsoring the project and other associates who are affected by the project   • Laptop and desktop computer for writing the project and doing the research project. • Internet access which is vital at both at home and in DIT. • Access to DIT library which will give me access to a variety of academic resources • Access to DIT student account to create research project materials. • • Access to statistical tools and software’s which can be accessed from the university • Network equipment’s borrowed to build the network All the resources and equipments are provided to me and its easy to get access whenever i want which makes it easy for me to complete this project. The time which is given to me to complete the project is abundant, and according to my gantt chart which i created for this purpose i am currently on time with my progression and not lack Data Flow Diagram DFD LEVEL 0:   2.2: Milestone Progress I have created a gantt chart which set outs all milestone and task which needs to be done and be completed for the project. As set in my chart i have completed my design in packet tracer and started implementing and configuring my cloud network for my client. Once is network is setup and successfully implemeted in packet tracer i will start configuting the network for my client. I have succcessfully completed my first milestone which was set out in the gantt chart which makes me confident to say that i am on the right track. The second milestome which i need to acheive is the security implementation for the cloud network and its a crucial stage for the project. After the completion of the full implentention the testing will be carried out. I have also completed my other milestones which are documentation for the project. The contextual report which shows the brief palnning and the design of the project haas been completed and vieved by my client. Another documenatuon which is also very important in this project is the ethic form which needs to be signed by the project manager and the supervisor. The ethics form was the first milestone for me to complate and get it approved in order to start the project. 2.3: Problems Some of the problems which i had is during the starting of the project as theer was a 3 weeks delay for my project to get sanctioned which resulted in not getting my ethics form signed.The project started late and theer were 3 different deadline which was set out for the project. I was not able to meet the first deadlime in which my client wanted to see the contextual report of the project and to check if everything was going according to its requirement and standards, however i was able to get an extension on that deadline and was able to delever the project report to my client later on. The other orpblem which i could face is the budget which is required in order to complete this project. All the resources and equipmemnts are provided by the client but could lead to some issues in the future if the lab which is required to work on the project is not available or due to any other technical problems. Section 3: REFLECTION 3.1: Introduction I had taken the responsibility to do a through research I had to talk about the project that I am on (creating a new database for the management information system).Ihad done a presentation on cloud computing in the past for different occasion and learned my strength and weaknesses and knew how to tackle any problems if it comes to it. Despite of the weakness in the topic i spend a quite amount of time preparing in a way so that i can be professional and find the best solution for my client to achiebe their expectation at its best. 3.2: Personal Report The first part was the report and getting the ethical form signed by the supervisor so that i can start with the project. The first part of the project was the contextual report in which i had to do a proper research and explain my client why switching to cloud computing is beneficial for them and it is the latest technilogy which is been used by all small to big corporate. I did my research about cloud computing and tried to learn each and every aspects of it and even found out the disadvantage of cloud computing. Through my research i was able to learn abouut different types of models available in cloud computing and was able to determine the best model which will meets all my client requirement. There were so many different type of chracteristic of cloud computing which will help to boost the client in many ways. Also in my research i learned security flaws whcih could bee fixed by adding data integrity protection in regenearting- coding based cloud storage. which will cover a major security issue in cloud computing and from a business viewpoint, it will ensure that cloud computing adoption projects are fully cost, and risks are properly understood. We will be adding this part to enable the extra security which is need in cloud computing for an organisation. By enabling data integrity protection in regeneration coding based on the cloud storage it safeguard the outsourced data which is present in the cloud storage against any kind of corruption which can lead to loss of data. This is why it’s become really crucial and critical by putting a fault tolerance in the cloud storage and also adding an efficient data integrity checking and recovery procedure to prevent any issues.I have learnt through my rfesearch that by designing and implementing a DIP (data integrity protection) for a precise regenerating code and keeping in mind to preserve it’s its basic properties of fault tolerance and repair-traffic. This will enable the clients or users which are using the service to easily see confirm the data integrity of different types of random subsets of outsourced data against malicious corruptions. 3.3: Reflection on action When creating the contextual report I thought it several days in order to make it perfect so the clients knows what I am doing. After the completion of my contextual report I was able to learn in depth about cloud computing and how it can be used for corporation and as well as common users. I made a mistake at the start of the project which leaded me into some downfalls during my report. What I didn’t do before i started developing my project is to create a gantt chart that could have helped me out creating different task and sub task for the project and could see myself achieving a milestone every time I finished a task in the chart. By not doing this I missed my first deadline to show my contextual report to my client to see where I am with the project. However an extension was given and the deadline was met later on. When doing the research it was quite easy to find ou the best solution for my client, but when it came to add the security feature in the cloud storage it took me a lot of time to find the best solution which made it exceptionally hard. I had a very tough experience overall the find a complete overall solution for my client to convince them why cloud computing is very useful in today’s world and security features that could be added to make it much more relaible and strong. 3.4: Reflection on Teaching I have been taught the basic of cloud computing in university and my colleges. I was able to learn more in depth about cloud computing in a special lecture which was help by the university and was able to take notes which helped me out to complete this project. I was also able to gather more information by conducting my own research which made me confident in this topic and chose this as my project for the client. 3.5: Connections I found out the usefulness of cloud computing and how its advancing itself in the modern world. From single users to big corporation are taking the advantage of cloud computing to improve them self in their own ways. Cloud computing offers many advantages and different type of uses where anyone can use and utilize it to its fullest. My knowledge and experience on cloud computing was limited, but after doing my own theoretical research I was able to find out its main purpose and how it can boost many individual users leading to big companies. I have made a great progression so far with the project as the contextual report was done in a through way and I was able to meet all my milestome which was set by me in order to complete this project. 3.6: Identifying any gaps I had to take an agenda where I tried to have weekly meeting with my supervisor but was not able to to so. I was not able to have a face to face meeting with my supervisor to discuss about my project so I took a another way in order to communicate with him. I was able to achieve that only through e-mail which turned out to be more effective as my supervisor usually responded to me in few hour and any documentation which needed to be signed was electronically done as well. This helped me save a lot of time, I was confident but I did spend quite a bit of time preparing for the project as it required me to do a lot of research and trying to find the best solution for my client. Section 4: CONCLUSION 4.1: Time Management Time management is one of the key strength and importance which is required to complete this project before the deadline. There is couple of deadline which I need to meet and show to my client regarding about the progression of the project. In order for me to achieve this I divided my task and major work which need to be completed for the project by creating a Gantt chart. A Gantt chart, which is higly used by project manager in order to help them with their project management, is one of the most useful ways of showing activities (tasks or events) displayed against time.By creating a gantt chart for this project i set up milestone which i had to reach before each deadlione. This will help me to complete the project in time and will also help me to reach deadline in time and help me to achieve a milestone in each phase. 4.2: Organization Majestic software Development Company who has run as an independent business for the last 8 years developing new software and sell their products to different clients. The company has three different departments which are divided into development, testing and trainee in which all these departments receive a high speed internet connection. My client wants to expand his horizon over the World Wide Web by introducing his entire product online for users to download and pay for the service. The company wants to move services to cloud as much as possible as its cheaper, flexible, easy to recover and want to get all the feature of a cloud network which can boost up the company. I have been appointed by the company to present and built the Cloud Based Networking Proposal to satisfy every need for my client. Cloud storage is one of the main proposals for an on-demand data outsourcing service model, and is rapidly gaining popularity due to its many different feature like elasticity and low maintenance cost. However, there are also downfalls like security concerns arise when data storage is subcontracted or outsourced to third-party cloud storage providers. It is necessary to enable cloud clients to confirm the reliability of their outsourced data in the cloud in which the user need to know if their data has been unintentionally corrupted or maliciously compromised by insider/outsider different types of attacks. To prevent this i will be adding fault tolerance to cloud storage, along with efficient data integrity checking and recovery procedures, becomes critical. 4.3: Reading and Note Taking I did a research on the topic and tried getting as much information form the internet and read articles and books about cloud computing and found many ways how it would beneficial my client. I took notes during special lectures which gave me understanding how to start the project and execute it at the end. 4.4: Problems and issues Few problems which raised during the starting of the project was that it took few weeks for the project to get sanctioned by the supervisor. It took nearly more than 3 weeks to get the ethical form for the project to be approved by the supervisor in order to start the project. Once the ethical form was signed it delayed my process to create a project proposal; for my client to have a look at it and if every specification in the project proposal meets the client expectation. I couldn’t present my project proposal before I got my ethical form signed by my supervisor and all this resulted me missing my first deadline for the project which was to show the contextual report. Getting access to resources and equipments were little harder than I thought. 4.5: How problems and issues were solved Meeting with the supervisor face to face became impossible and so we decided to sent e-mails which would make the process much quick and easy. I was given an extension to show my contextual report. Resources and equipments were booked way in advance so that It wouldn’t lead to any delays in the project.